Sciweavers

29 search results - page 1 / 6
» Optimal Information Security Investment with Penetration Tes...
Sort
View
ICHIT
2009
Springer
14 years 1 days ago
Using w3af to achieve automated penetration testing by live DVD/live USB
As the popularity of the Internet continues growing, there are more and more services appeared, security measures are expected to become all the most important on the Internet. Pe...
Jiun-Kai Ke, Chung-Huang Yang, Tae-Nam Ahn
SICHERHEIT
2010
13 years 3 months ago
A Fuzzy Model for IT Security Investments
: This paper presents a fuzzy set based decision support model for taking uncertainty into account when making security investment decisions for distributed systems. The proposed m...
Guido Schryen
DSS
2006
91views more  DSS 2006»
13 years 5 months ago
Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach
Organizations are making substantial investments in information security to reduce the risk presented by vulnerabilities in their information technology (IT) infrastructure. Howev...
Mukul Gupta, Jackie Rees, Alok R. Chaturvedi, Jie ...
INFOSECCD
2006
ACM
13 years 11 months ago
Is attack better than defense?: teaching information security the right way
A recent trend in security education is towards teaching offensive techniques which were originally developed by hackers. This reflects tendencies in the professional world where ...
Martin Mink, Felix C. Freiling